Transcript
Data Sheet
McAfee Complete Endpoint Protection— Enterprise Strong, fast, and scalable defense for every device, every threat
McAfee Complete Endpoint Protection—Enterprise suite makes it easy to get security right, from turnkey installation to rapid response. With one unified solution, you cover all the devices in your enterprise—PCs, Macs, Linux systems, virtual machines, smartphones, tablets, and servers. Reduce management complexity and cut costs, while protecting endpoints against rootkits, mobile malware, targeted web and email attacks, and persistent threats. Achieve a level of powerful, efficient protection and management that’s available only from McAfee, the market leader in endpoint security. Complete Protection When it comes to threat protection, you can’t do any better than McAfee Complete Endpoint Protection—Enterprise. In a recent NSS Labs test, McAfee was ranked as the top-scoring vendor in defending against exploits and evasion attacks. Only McAfee takes protection into the hardware and throughout the application layer for protection like no other. McAfee Deep Defender leverages McAfee and Intel technology for industry-leading hardware-enhanced security beyond the operating system (OS). McAfee earned a perfect score for protection against rootkits that burrow deep into the kernel in a comparative review by AV-TEST. Dynamic whitelisting through application control protects users from harmful applications and code originating from zero-day threats or advanced persistent threats (APTs).
Zero-Day Rootkit Protection
(Detected Rootkits)
Key Advantages Get fast, top-rated hardwareenhanced protection against today’s toughest and stealthiest threats. • Unify management across all your endpoints, from virtual machines and servers to PCs and mobile devices. • Reduce the application attack surface, save time and effort with dynamic whitelisting. • Act in real time to fix vulnerabilities and stop threats in their tracks. • Manage risk by directing security efforts where they are needed most. •
Endpoint security should support your business, not slow it down. Defend your business and empower your employees to be productive. Strong, simple, and fast, McAfee® Complete Endpoint Protection—Enterprise suite provides real-time visibility into security and risk along with unified management. McAfee delivers the highest scoring threat protection to all of your devices, from servers and virtual machines to PCs and mobile devices—in one easy-to-manage, integrated solution. Guard systems and data against complex, stealthy threats with dynamic application control, behavioral intrusion prevention, instant risk assessment, hardware-enhanced security to defend against rootkits, and global threat intelligence across all threat vectors.
100% 83% 67%
McAfee Deep Defender
Vendor A
Vendor B
Source: AV-TEST report, Proactive Rootkit Protection Comparison Test.
See more, know more, and defend your organization better with cloud-based McAfee Global Threat Intelligence, which gives you the full spectrum of new and emerging threats in real time across all vectors—file, web, message, and network. Complete Performance Focused scans and focused actions provide you with security that keeps your business running smoothly 24/7 with minimal downtime. Superior performance across all platforms comes from advanced smart scanning and memory management techniques that
optimize CPU and memory usage. With application control, you experience ultra-low CPU and memory usage, while avoiding excessive scans and .DAT update cycles.
McAfee: An Industry Leader A Magic Quadrant for Endpoint Protection Platforms leader since 2007. (Gartner) • A leader in the Magic Quadrant for Mobile Data Protection for the past four years. (Gartner) • Highest score in protection against exploit and evasion attacks. (NSS Labs) • Highest block rate and an overall score of 97% in exploit protection. (NSS Labs) • 100% in proactive protection against zero-day rootkit and kernel stealth attacks. (AV-TEST) •
Complete Simplicity In as few as four clicks and 20 minutes, your security is ready to go. Unified, real-time management with McAfee® ePolicy Orchestrator® (McAfee ePO™) software streamlines your policy management workflow across all devices and provides a single pane of glass for visibility. Real Time for McAfee ePO gives you instant access to critical security data, so IT can respond 10 to 1,000 times faster when incidents occur.
With dynamic application control, users can install new software by simply following approved processes, eliminating the frustrations and delays of manual whitelisting. And we include McAfee Risk Advisor to help you easily manage risk and prioritize protection for your most important assets, based on which emerging threats are affecting which assets and whether you have required mitigations in place. Protect Endpoints Against All Phases of Malicious Attack McAfee Complete Endpoint Protection—Enterprise brings together a strong set of proactive defenses to protect you against today’s complex threats at every stage. Here’s how we minimize risk in a typical attack scenario.
Anatomy of an Attack Stages of an Attack
How McAfee Complete Endpoint Protection—Enterprise Suite Defends You
Pre-Attack Phase Proactive measures reduce the attack surface and vulnerabilities.
• Instant visibility into the security health of your endpoints helps you reduce the attack surface easily and efficiently.
First Contact Malware comes in contact with unsuspecting users, usually through a malicious website. Other access points are removable media, unsolicited messages from social media sites, and misconfigured or unsecured wireless networks.
• Safe surf and search and web content filtering reduce chance of exposure to or drive-by downloads of malware.
Local Execution Bad code runs on target machines to exploit vulnerabilities in applications or the OS. If the malware can subvert protections, it writes its code to disk.
• Below-the-OS detection enhanced by hardware blocks kernel and boot-level rootkits.
• Prioritize risk based on real-time threat updates, threat relevance, and countermeasures in place.
• Device control blocks use of unapproved storage media that may be infected with malware. • Network connection reputation shuts down botnets, denial-of-service attacks, and malicious traffic. • Mobile anti-malware prevents compromise of smartphones and tablets.
• Host intrusion prevention blocks exploits and shields unpatched vulnerabilities. • Dynamic application control allows installation of only known good files or applications based on dynamic whitelisting. • On-access scanning monitors memory and network traffic. • Secure container for mobile email protects enterprise data on devices.
Establish Presence Malicious code hides on the system and is made to persist, so that it survives reboot and stays hidden from security measures and from the user.
• Traditional antivirus and anti-malware.
Malicious Activity Goal of attack is achieved—from stealing identities and intellectual property theft to bank fraud.
• Host-based firewalls prevent connections to known malicious bot networks and limit the loss of sensitive data.
• Hardware-enhanced security protects against rootkits and other stealthy attacks. • Host intrusion prevention protects during startup and off the network.
• Whitelisting prevents malicious software from tampering with known good application files and prevents execution of bad code.
Security Connected from McAfee McAfee Complete Endpoint Protection—Enterprise suite helps you optimize your security and risk posture as you reduce costs and increase agility. Through the Security Connected framework from McAfee, you can streamline and automate protection and incident management processes
to reduce security overhead and inefficiency. With real-time security management and global threat intelligence, McAfee helps you identify, prioritize, and resolve risks to your business quickly and easily. For more information, visit: www.mcafee. com/complete-endpoint-enterprise.
McAfee Complete Endpoint Protection—Enterprise Suite Highlights Anti-Malware (PCs, Macs, Linux, virtual machines) McAfee VirusScan® Enterprise • Industry leading, enterprise-class anti-malware protection with integrated day-zero threat protection. McAfee Deep Defender • Stop rootkits and stealthy attacks with protection below the OS.
• •
Dynamic Application Control • Prevent unwanted applications and malware from installing and executing with minimal impact on system performance, users, and administrators.
•
Host Intrusion Prevention and Endpoint Firewall • Guard against unknown, zero-day threats and new vulnerabilities.
•
• Reduce patch urgency. Global Threat Intelligence • Defend against new and emerging threats across all vectors with real-time intelligence gathered by millions of sensors worldwide.
•
Web and Messaging Security McAfee SiteAdvisor® with URL Filtering • Warn users about malicious websites before they visit to reduce risk and stay compliant.
•
• Authorize or block website access. Email Anti-Malware and Antispam • Protect email server and intercept malware before it reaches user inboxes. • Detect, clean, and block malware from Microsoft Exchange and Lotus Domino servers with McAfee GroupShield.
•
Mobile Security Mobile Anti-Malware and Device Management • Secure mobile devices, data, and networks.
•
• Simplify provisioning and de-provisioning. Data Protection Device Control • Prevent loss of sensitive data by restricting use of removable media.
•
Management and Risk Assessment McAfee ePO and Real Time for McAfee ePO • Manage policies, compliance, and reporting from a single, centralized console.
•
• Instantly see and take action to adjust security health of endpoints. Risk Assessment • Pinpoint which critical assets are vulnerable to which threats. • Get instant, actionable data correlation on emerging threats to quickly identify whether proper protection is in place.
•
• Reduce time spent patching and diagnosing issues.
2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com
McAfee, the McAfee logo, ePolicy Orchestrator, McAfee ePO, and SiteAdvisor are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright © 2013 McAfee, Inc. 60718ds_complete-protection-ent_1213_fnl_ETMG